Skip to main content

Nginx Server

Server Preparation

To prepare your server, ensure communication ports are properly configured. HAWKI deployment requires the HTTPS protocol, though testing locally using HTTP is possible but not recommended.

For this guide, we'll assume port usage as follows:

  • HTTP: Port 80
  • HTTPS: Port 443

Ensure your server meets the following requirements to run Laravel/PHP applications:

  1. PHP version 8.2 or higher
  2. Required PHP Extensions:
    • PHP >= 8.2
    • Ctype PHP Extension
    • cURL PHP Extension
    • DOM PHP Extension
    • Fileinfo PHP Extension
    • Filter PHP Extension
    • Hash PHP Extension
    • Mbstring PHP Extension
    • OpenSSL PHP Extension
    • PCRE PHP Extension
    • PDO PHP Extension
    • Session PHP Extension
    • Tokenizer PHP Extension
    • XML PHP Extension

Ensure output buffering is enabled in your php.ini file by un-commenting: output_buffering = 4096 or setting: output_buffering = On

Additionally, verify that Node and Composer are installed on your machine.


Nginx Server Configuration

Nginx requires specific configuration to work properly with Laravel applications and WebSocket connections.

  1. Install Nginx if not already installed:
sudo apt update
sudo apt install nginx
  1. Create a new Nginx server block configuration: sudo nano /etc/nginx/sites-available/hawki

  2. Add the following configuration:

server {
listen 80;
server_name your-domain.com;
return 301 https://$server_name$request_uri;
}

server {
listen 443 ssl;
server_name your-domain.com;

ssl_certificate /path/to/your/certificate.crt;
ssl_certificate_key /path/to/your/private.key;

root /var/www/html/hawki-project/public;
index index.php;

location / {
try_files $uri $uri/ /index.php?$query_string;
}

location ~ \.php$ {
include snippets/fastcgi-php.conf;
fastcgi_pass unix:/var/run/php/php8.2-fpm.sock;
}

location ~ /\.ht {
deny all;
}

# WebSocket Proxy for Laravel Reverb
location /app {
proxy_pass http://localhost:8080/app;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
}

location /apps {
proxy_pass http://localhost:8080/apps;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
proxy_set_header Host $host;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto $scheme;
}
}

This configuration creates a redirect from HTTP to HTTPS and sets up the necessary proxy rules for WebSocket connections.

  1. Create a symbolic link to enable the site:
sudo ln -s /etc/nginx/sites-available/hawki /etc/nginx/sites-enabled/
  1. Test the Nginx configuration:
sudo nginx -t
  1. Restart Nginx:
sudo service nginx restart

Project Deployment Steps

  1. Copy the HAWKI project content to the Nginx web server location. This can be done via cloning the git repository or manually uploading files: git clone https://github.com/HAWK-Digital-Environments/HAWKI.git /var/www/html/hawki-project

  2. Set proper permissions for Laravel:

sudo chown -R www-data:www-data /var/www/html/hawki-project
sudo chmod -R 755 /var/www/html/hawki-project/storage
sudo chmod -R 755 /var/www/html/hawki-project/bootstrap/cache
  1. Install dependency packages by navigating to the project root and executing:
cd /var/www/html/hawki-project
composer install
npm install
npm run build
  1. Generate an application key:
php artisan key:generate

At this point, the project is transferred to the server, but you may encounter a Laravel error if the database connection is not configured.


DATABASE

  1. If not already installed, set up a preferred database. This documentation employs MySQL, but selection depends on your usage and specific requirements.

!!! Please make sure that your database has proper security !!!

  1. Create a new, empty database, such as HAWKI_DB.
  2. Update the database connection settings in the .env file with:
DB_CONNECTION=mysql
DB_HOST=127.0.0.1 #Database host IP
DB_PORT=3306 #Database host port
DB_DATABASE=HAWKI_DB #Database name
DB_USERNAME=your_username #Database username
DB_PASSWORD=your_password #Database password
  1. Run database migrations and seed data by navigating to the project directory and executing:
php artisan migrate
php artisan db:seed

At this stage, the database tables should be set up and operational.

IMPORTANT: If instructions are not strictly followed, please do not forget to seed the database before allowing any other users to join HAWKI. This will ensure that the AI Agent (HAWKI) is registered as a user on the database. If you want start a fresh database run:

php artisan migrate:fresh --seed

PROJECT CONFIGURATION

Edit the .env file within the root folder. Most variables can remain at their default values unless specific adjustments are required.

To allow clients to read files from the storage folder, we need to create a symbolic link for the storage. Use the following command to create the symbolic link: php artisan storage:link

You should be able to see the storage shortcut inside public folder.

Please note that after changing the structure of your files in the storage folder you may need to recreate the virtual link:

sudo rm -rf public/storage
php artisan storage:link

Setup Server Salts

For encryption purposes, HAWKI utilises individual salts for each component. Though not mandatory, unique hash keys are recommended:

Setup Authentication Methods

In the .env file find AUTHENTICATION_METHOD variable. Currently HAWKI supports LDAP, OpenID, and Shibboleth authentication services. A built-in Test User Authentication for internal testing purposes is also available.

Set the variable to one of the following:

- AUTHENTICATION_METHOD="LDAP"
- AUTHENTICATION_METHOD="OIDC"
- AUTHENTICATION_METHOD="Shibboleth"

According to your authentication method, set the necessary variables. For more information refer to the documentation in .env file.

Add Data Protection and Imprint

Data protection and imprint notes are linked in the login page. To set your organization specific legal notes:

  1. In the .env file find IMPRINT_LOCATION and add the URL to your organization imprint page.
  2. Locate DataProtection Files in the /resources/language folder and add the data protection notes for each language in HTML format.

Adding API Keys

Navigate to config folder. There you'll find model_providers.php.example. Rename it to model_providers.php. Open the file and update the configuration as you need. HAWKI currently supports OpenAI, GWDG, and Google.

// The Default Model (use the id of one of model you wish)
'defaultModel' => 'gpt-4o',

// The model which generates the chat names.
'titleGenerationModel' => 'gpt-4o-mini',

'providers' =>[
'openai' => [
'id' => 'openai',
'active' => true, //set to false if you want to disable the provider
'api_key' => ' ** YOUR SECRET API KEY ** ',
'api_url' => 'https://api.openai.com/v1/chat/completions',
'ping_url' => 'https://api.openai.com/v1/models',
'models' => [
[
'id' => 'gpt-4o',
'label' => 'OpenAI GPT 4o',
'streamable' => true,
],
...
]
],
...
]

Broadcasting & Workers

HAWKI uses https://reverb.laravel.com/ for real-time communication between client and server. In the .env file you simply need to set reverb variables:

REVERB_APP_ID=my-app-id
REVERB_APP_KEY=my-app-key
REVERB_APP_SECRET=my-app-secret

REVERB configuration defaults to port 8080. Use HTTPS for secure communication:

REVERB_SERVER_HOST=0.0.0.0
REVERB_SERVER_PORT=8080

However, to secure the communication between the client and the server you should use https protocol and port 443 for websocket as well. Set the variables to:

REVERB_HOST=yourDomain.com // set your domain without any prefixes
REVERB_PORT=443
REVERB_SCHEME=https //reverb scheme must be set to https instead of http.

Also add the path to the SSL certificate chain and key path:

SSL_CERTIFICATE="/path/to/certificate.crt"
SSL_CERTIFICATE_KEY="/path/to/private.key"

Ensure Port 8080 is blocked by the server firewall to prevent direct access. The WebSocket proxy configuration added to the Nginx server block handles the secure redirection.


SERVICES

Before broadcasting messages to users, each message is queued on the server and processed by Laravel workers. In order to automate the Reverb broadcasting and Laravel workers, we need to create system services:

  1. Create a new file for Reverb at /etc/systemd/system/reverb.service. Insert this content:

Don't forget to update paths: /var/www/html/hawki-project

[Unit]
Description=Reverb WebSocket Server
After=network.target

[Service]
User=www-data
Group=www-data
WorkingDirectory=/var/www/html/hawki-project
ExecStart=/usr/bin/php /var/www/html/hawki-project/artisan reverb:start
Restart=always
TimeoutSec=300
LimitNOFILE=4096

[Install]
WantedBy=multi-user.target
  1. Create a new file for workers at /etc/systemd/system/laravel-worker.service. Insert this content:

Don't forget to update paths: /var/www/html/hawki-project

[Unit]
Description=Laravel Worker Service
After=network.target

[Service]
User=www-data
Group=www-data
WorkingDirectory=/var/www/html/hawki-project
ExecStart=/usr/bin/php /var/www/html/hawki-project/artisan queue:work --queue=default,mails,message_broadcast --tries=3 --timeout=90

Restart=always
RestartSec=5
TimeoutSec=300
LimitNOFILE=4096

ExecStartPost=/usr/bin/php /var/www/html/hawki-project/artisan queue:restart

StandardOutput=append:/var/www/html/hawki-project/storage/logs/worker.log
StandardError=append:/var/www/html/hawki-project/storage/logs/worker-error.log

[Install]
WantedBy=multi-user.target

  1. Reload Systemd Manager Configuration:
sudo systemctl daemon-reload
  1. Enable services:
sudo systemctl enable reverb.service
sudo systemctl enable laravel-worker.service
  1. Start the Services:
sudo systemctl start reverb.service
sudo systemctl start laravel-worker.service
  1. Check Status (to ensure they started correctly):
sudo systemctl status reverb.service
sudo systemctl status laravel-worker.service

Now that workers are running, the queued messages should be successfully broadcasted to the users.


Troubleshooting

1. Config updates are not applied to the project.

By default Laravel caches every configuration in the project. Don't forget to clear the cached data after each adjustment. For example by using:

php artisan config:clear php artisan cache:clear php artisan route:clear php artisan view:clear

2. Styles or Javascript updates are not applied

If the styles in browser seem incorrect or the changes are not visible on a live server, the issue may be due to the cached style or scripts in your browser. Try to hard reload or empty browser cache and reload. Some changes in javascript may be also cached in view caches. Use php artisan view:clear to clear the cache.

3. "Failed to fetch Server Salt"

Clear Config and cache: php artisan config:clear php artisan cache:clear

4. Vite Packages are not loaded. (md is not defined)

Make sure node packages are built npm run build. If the problem persists, locate and remove "hot" file in the public folder.

5. Nginx 502 Bad Gateway Error

This might occur if PHP-FPM is not running or configured correctly:

sudo systemctl status php8.2-fpm
sudo systemctl restart php8.2-fpm
Also check the Nginx error logs for more details:
sudo tail -f /var/log/nginx/error.log

6. WebSocket Connection Failure

If WebSocket connections fail, ensure the Reverb service is running and the proxy configuration is correct:

sudo systemctl status reverb.service

Check that your firewall allows connections on port 443 but blocks direct access to port 8080.